Release Notes : APM Client 7.2.3.1

Applies To:

Show Versions Show Versions

BIG-IP APM

  • 17.0.0, 16.1.4, 16.1.3, 16.1.2, 16.1.1, 16.1.0, 16.0.1, 16.0.0, 15.1.10, 15.1.9, 15.1.8, 15.1.7, 15.1.6, 15.1.5, 15.1.4, 15.1.3, 15.1.2, 15.1.1, 15.1.0, 15.0.1, 15.0.0, 14.1.5, 14.1.4, 14.1.3, 14.1.2, 14.1.0, 14.0.1, 14.0.0, 13.1.5, 13.1.4, 13.1.3, 13.1.1, 13.1.0
Release Notes
Software Release Date: 11/07/2022
Updated Date: 08/30/2023

Summary:

BIG-IP Edge Client establishes secure communications to applications and networks. It provides users with full access to IP-based applications, resources, and intranet files as if they were physically working on the office network. This release note contains information about the changes made for the current version only. Refer to the prior release note versions for additional information.

The Edge Client version 7.2.3.1 is now available on downloads.f5.com (under the APM Clients container).

The following table contains APM client 7.2.3.1 versions for different operating systems:

APM Clients Version BIG-IP Edge Client Windows Version Linux/Mac Client version

7.2.3.1

apmclients-7231.2022.1019.458-6051.0.iso

7231.2022.1019.458

Linux: 7231.2022.1017.1

MAC: 7231.2022.1017.1

Contents:

User documentation for this release

For a comprehensive list of documentation that is relevant to this release, refer to the following pages:

Features and enhancements

Auto Launch Edge Client in Disconnected State After User Logon

The existing behavior of Auto launch after Windows Logon is to launch Edge Client after the system user logs into Windows and initiates VPN connection automatically. Now, this behavior is changed, and introduced the Launch in Disconnected State option which controls automatic VPN connection. If you want the Edge Client to start in the disconnected state, select the Launch in Disconnected State option otherwise you can leave the option cleared which is its default state. This feature is only supported for Windows Edge Client. The Launch in Disconnected State option is programmatically always set to False when Edge Client is deployed with Always Connected mode.

In order to change the default settings, you can add below XML tags in config.f5c file until the BIG-IP 17.1.0 release which will have respective UI settings:

<LAUNCH_IN_DISCONNECTED_STATE>YES</LAUNCH_IN_DISCONNECTED_STATE>

Improve Edge Client Notification Mechanism While Reconnecting to VPN

For the Edge Client notifications, when the system is in sleep mode and certain scenarios like VPN connection session expiry or inactivity timeout, Edge Client tries to re-authenticate and prompts the user to enter the credentials. At this point, if the Edge Client is in minimised state it displays Action Required user notification for a period of time. A Maximise Edge Client When Credentials Required option is introduced to allow the Edge Client login window to maximise itself and prompts for user credentials if required. If you want Edge Client in maximised status while reconnecting or when credentials are required instead of showing Action Required notification, select this option otherwise you can leave the option cleared which is its default behavior. This feature is only supported for Windows Edge Client.

In order to change the default settings, you can add below XML tags in config.f5c file until the BIG-IP 17.1.0 release which will have respective UI settings:

<MAXIMISE_EDGE_CLIENT_WHEN_CREDENTIALS_REQUIRED>YES<MAXIMISE_EDGE_CLIENT_WHEN_CREDENTIALS_REQUIRED>

Fixes

The following issues have been fixed in this release.

ID Number Description
1060661-2 Fixed the issue where proxy or PAC settings configured in Network Access are not applied after VPN connection on Windows client when Internet Explorer (IE) 11 is disabled.
1075817-1 Fixed the issue where the Edge Client did not follow the best practices for Windows support.
1075849-1 Improved Edge Client to follow the best practices while establishing a VPN connection.
1086289-1

1086293-1

Fixed the issue where Windows Installer did not follow the best practices.
1107385-1 Fixed the issue where Edge Client fails to render the external logon pages in some cases.
1124177-1 Fixed the issue where Network Access drive mapping SSO feature is broken even when APM and Network Drive System credentials are the same.
1133249-1 Fixed the issue where Edge Client used crash when cookie count exceeds 32 for SAML Authentication. Now changed the limit to 180 as per recommended best practices.
1155497-1 Fixed the issue and now the size limit for Network Access (NA) split tunneling configuration of Exclude Address space has increased to 20KB. It can now hold up to 640 IPs
1156441-1 Fixed the issue where Stonewall Service blocked external traffic as Edge Client was taking 5 to 10 minutes to establish the VPN connection after the system restored from hibernation. Now, Edge Client establishes the VPN connection immediately and Stonewall service allows external traffic as per configuration.

Known issues

The following are known issues in this release.

ID Number Description
1072901 The Windows logon integration does not work with TLS 1.3 on windows 10 and Windows 11.

Workaround: Enable other versions of TLS to allow Windows Logon client to fallback to an older version of TLS protocol.

1079621 When the application is moved to the trash, the respective application F5 EPI or F5 VPN directory is getting deleted from the following path:

/Applications/F5 Endpoint Inspector.app/Contents/Resources/

Whereas, the respective application specific (F5 EPI or F5 VPN) folder is not getting deleted from the following path:

/Users/<username>/Library/Applications Support/F5 EPI

The plist file of the respective application is not deleted from the following path:

/Users/<username>/Library/Launchagents/

Workaround:
  1. Upgrade to the latest build and verify the time stamps available in the following paths:

    Application directory: /Users/<username>/Library/Applications Support/F5 EPI

    Plist file path : /Users/<username>/Library/Launchagents/

  2. Check the EPI and VPN functionality in all the cases.
  3. Restart and install EPI and VPN
  4. Uninstall and re-install the EPI and VPN
  5. Check whether the F5 EPI and F5 VPN applications are removed from the /Applications/ path.
1082821 When trying to establish a VPN connection using a browser, it does not work with TLS 1.3 on all versions of macOS.

Workaround: Enable other versions of TLS to allow the browser to fallback to any other versions of TLS protocol.

1082825 When trying to establish a VPN connection using a browser, it does not work with TLS 1.3 on Linux.

Workaround: Enable other versions of TLS to allow the browser to fallback to any other versions of TLS protocol.

1082909 When trying to establish a VPN connection, it does not work with TLS 1.3 on Windows 11.

Workaround: Enable other versions of TLS to allow APM client to fallback to any other versions of TLS protocol.

1083397 Installation of the Edge Client versions prior to 7.2.2 may be successful on the ARM64-based Windows 10 and Windows 11 but fails to establish the VPN connection.

Workaround: Uninstall the prior versions of Edge Client 7.2.2 and install the ARM64-supported Edge Client version using the MSI installer package.

1084369 Optimized tunnels are not supported on ARM64-based Windows 10 and Windows 11 systems. When Optimized tunnels are used, the tunnel connection fails without user notification.

Workaround: In some cases, use a static app tunnel to establish a tunnel connection.

1184869-1

On the Edge Client, when the user enters the credentials on the Ping window and presses the Enter key to log in, it results in a page expired error.

Workaround:

After the credentials are entered, use the mouse and click the Sign On button.

Contacting F5

North America 1-888-882-7535 or (206) 272-6500
Outside North America, Universal Toll-Free +800 11 ASK 4 F5 or (800 11275 435)
Additional phone numbers Regional Offices
Web http://www.f5.com
Email support@f5.com

How to Contact F5 Support or the Anti-Fraud SOC

You can contact a Network Support Center as follows:

You can manage service requests and other web-based support online at F5 My Support (registration required). To register email CSP@F5.com with your F5 hardware serial numbers and contact information.

You can contact the Anti-Fraud SOC as follows:

Additional resources

You can find additional support resources and technical documentation through a variety of sources.

F5 Support

https://f5.com/support :: Self-solve Options

Free self-service tools give you 24x7 access to a wealth of knowledge and technical support. Whether it is providing quick answers to questions, training your staff, or handling entire implementations from design to deployment, F5 services teams are ready to ensure that you get the most from your F5 technology.

AskF5 Knowledge Base

https://support.f5.com/csp/home

The storehouse for thousands of knowledgebase articles that help you manage your F5 products more effectively. Whether you want to browse periodically to research a solution, or you need the most recent news about your F5 products, AskF5 is your source.

BIG-IP iHealth Diagnostics and BIG-IP iHealth Viewer

https://f5.com/support/tools/ihealth

BIG-IP iHealth Diagnostics identifies issues, including common configuration problems and known software issues. It also provides solutions and links to more information. With BIG-IP iHealth Viewer, you can see the status of your system at-a-glance, drill down for details, and view your network configuration.

F5 DevCentral

https://devcentral.f5.com/

Collaborate and share innovations including code samples, new techniques, and other tips, with more than 300,000 F5 users worldwide. DevCentral is the place to ask questions, find solutions, learn to harness the power of F5’s powerful scripting language, iRules, and much more.

Communications Preference Center

https://interact.f5.com/F5-Preference-Center.html

Here, you can subscribe to a number of communications from F5. For information about the types of notifications F5 provides, see K9970: Subscribing to email notifications regarding F5 products.